Sökning: "Stealthy Attacks"
Visar resultat 1 - 5 av 9 avhandlingar innehållade orden Stealthy Attacks.
1. Stealthy Sensor Attacks on Feedback Systems : Attack Analysis and Detector-based Defense Mechanisms
Sammanfattning : In this thesis, we investigate sensor attacks on feedback systems and how anomaly detectors can be used as a defense mechanism. We consider an attacker with access to all sensor measurements and full knowledge about the closed-loop system model. LÄS MER
2. Departure-Based Intrusion Detection
Sammanfattning : Industrial Control Systems (ICS) combine information technology with operation technology to monitor or control physical industrial processes via computer-based programs and often operate on critical infrastructures. As such, compromised or maliciously operated ICS can cause devastating consequences on society at large. LÄS MER
3. Understanding the Capabilities of Route Collectors to Observe Stealthy Hijacks : Does adding more monitors or reporting more paths help?
Sammanfattning : Routing hijacks have plagued the Internet for decades. These attacks corrupt the routing table entries that networks use to forward traffic, causing affected network devices to route private and possibly sensitive Internet traffic towards the hijacker. LÄS MER
4. Analysis, Detection, and Mitigation of Attacks in Cyber-physical Systems
Sammanfattning : Cyber-Physical Systems (CPS) offer close integration among computational elements, communication networks, and physical processes. Such systems play an increasingly important role in a large variety of fields, such as manufacturing, health care, environment, transportation, defence, and so on. LÄS MER
5. Analysis of Attacks on Controlled Stochastic Systems
Sammanfattning : In this thesis, we investigate attack vectors against Markov decision processes anddynamical systems. This work is motivated by the recent interest in the researchcommunity towards making Machine Learning models safer to malicious attacks. LÄS MER